Подписаться
Maliheh Shirvanian
Maliheh Shirvanian
Visa Research
Подтвержден адрес электронной почты в домене visa.com
Название
Процитировано
Процитировано
Год
All your voices are belong to us: Stealing voices to fool humans and machines
D Mukhopadhyay, M Shirvanian, N Saxena
European Symposium on Research in Computer Security, 599-621, 2015
952015
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
M Shirvanian, S Jarecki, N Saxena, N Nathan
NDSS, 2014
552014
Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
M Shirvanian, N Saxena
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
542014
The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio
B Shrestha, M Shirvanian, P Shrestha, N Saxena
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
432016
Device-enhanced password protocols with optimal online-offline protection
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
392016
Two-factor authentication with end-to-end password security
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
IACR International Workshop on Public Key Cryptography, 431-461, 2018
292018
Sphinx: A password store that perfectly hides passwords from itself
M Shirvanian, S Jareckiy, H Krawczykz, N Saxena
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
282017
On the security and usability of crypto phones
M Shirvanian, N Saxena
Proceedings of the 31st Annual Computer Security Applications Conference, 21-30, 2015
212015
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines
M Shirvanian, N Saxena, D Mukhopadhyay
Journal of computer security 26 (3), 311-333, 2018
122018
Building and studying a password store that perfectly hides passwords from itself
M Shirvanian, N Saxena, S Jarecki, H Krawczyk
IEEE Transactions on Dependable and Secure Computing 16 (5), 770-782, 2019
112019
On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification
M Shirvanian, N Saxena, JJ George
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
112017
Quantifying the breakability of voice assistants
M Shirvanian, S Vo, N Saxena
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
82019
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech
SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
72021
Cccp: Closed caption crypto phones to resist mitm attacks, human errors and click-through
M Shirvanian, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
62017
Two-factor Password-authenticated Key Exchange with End-to-end Security
S Jarecki, M Jubur, H Krawczyk, N Saxena, M Shirvanian
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
52021
Adaptive SVD-based digital image watermarking
M Shirvanian, F Torkamani Azar
International Workshop on Digital Watermarking, 113-123, 2008
52008
A hidden-password online password manager
M Shirvanian, CR Price, M Jubur, N Saxena, S Jarecki, H Krawczyk
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1683-1686, 2021
32021
Access control for named domain networking
A Mohaisen, M Shirvanian, GC Murray
US Patent 10,887,314, 2021
32021
Voicefox: Leveraging inbuilt transcription to enhance the security of machine-human speaker verification against voice synthesis attacks
M Shirvanian, M Mohammed, N Saxena, SA Anand
Annual Computer Security Applications Conference, 870-883, 2020
32020
Crepe: A privacy-enhanced crash reporting system
K Satvat, M Shirvanian, M Hosseini, N Saxena
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
22020
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20